Wireless intrusion detection and device fingerprinting through preamble manipulation
a technology of preamble manipulation and intrusion detection, applied in the field of wireless networks, can solve the problems of spoofing and route poisoning attacks on wireless networks, and achieve the effect of energy efficient and invarian
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034]Wireless Personal Area Networks (WPAN) fulfill critical functions in healthcare, automation, and smart energy systems. However, WPAN devices are challenging to secure due to tight design constraints on cost, computing resources, and energy use. WPAN devices implement physical layer (PHY) features of the IEEE 802.15.4 standard in their transceiver hardware. While software tools such as KillerBee can generate arbitrary message payloads, low level specifications such as frame synchronization and the wireless preamble are immutable from software. The only alterable physical layer parameter on a WPAN device is the operating RF channel.
[0035]Device authentication is a fundamental process in communication networks. Ostensibly immutable hardware addresses (e.g., MAC addresses) often serve as the lowest level “true” hardware identity. However, MAC address spoofing is straightforward with open source tools such as macchanger for IEEE 802.11 and zbassocflood for IEEE 802.15.4. Cryptograp...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


